Commissum

Blog


Juniper Firewall Backdoor Christmas Cracker!



Juniper Firewall Backdoor Christmas Cracker!



How the heck did Juniper, the world’s second largest vendor of networking kit allow a backdoor on its enterprise firewall OS?
There are so many how, what, when and who’s to this story that it’s worth breaking it down somewhat to understand the background…

I want … |More

Watch out – the First European Union-wide Cybersecurity Law



Watch out – the First European Union-wide Cybersecurity Law



The importance of cybersecurity is constantly growing. Although the EU legislators have been discussing the cybersecurity issue for a few years now, they have come up with a major decision recently. The first legislation on cybersecurity has been agreed at the European Union level. The new … |More

The Latest Update on the Investigatory Powers Bill



The Latest Update on the Investigatory Powers Bill



The Investigatory Powers Bill (nicknamed the Snooper’s Charter) has been highly controversial since it was first proposed in May of this year. Numerous industries, as well as the general public, have concerns about privacy violations arising as part of the Bill; there are also moral questions … |More

Is Your Healthcare Device Hackable?



Is Your Healthcare Device Hackable?



Healthcare is a very personal subject for most of us. Therefore, the last thing we want is for something to go wrong. However, the healthcare sector is one of the most complicated industries, and its cybersecurity is particularly complex. Not surprisingly, ransomware in medical devices is … |More

Who Cares? It’s Only Security.



Who Cares? It’s Only Security.



I saw the above image on LinkedIn earlier and started writing a response to a couple of comments lambasting the fact security was way down at number 7 despite it being the fear fodder of the press. There were some insightful comments and I started offering … |More

Anonymous: “The war is declared. Get prepared.”



Anonymous: “The war is declared. Get prepared.”



Anonymous group has declared a “total war” on Islamic State (IS) after the deadly attacks in Paris, where 129 innocent people were killed last week. Anonymous group launched a video, with the message that says: “We are anonymous. We are uniting humanity. Expect us.” The war … |More

Are Phishing Attacks Here to Stay?



Are Phishing Attacks Here to Stay?



Phishing is a frequent cause of data security incidents in organisations. It is probably one of the most effective social engineering tools in the hacker’s kit. The reason a lot of organisations become targets of phishing attacks is that employees are simply not aware of its … |More

Health Sector Industry Needs a Cyber Security Health Check



Health Sector Industry Needs a Cyber Security Health Check



Why has the healthcare industry become one of the main targets for hackers? You may think that the financial sector is more likely to suffer cyber attacks. There is nothing more appealing than stolen banking data, right? Well, partly. Stolen credit card information is usually reported … |More

Is Your Mobile Phone Helping Hackers’ to Please Their Wishes?



Is Your Mobile Phone Helping Hackers’ to Please Their Wishes?

Two French researchers have created a rig consisting of a USRP (Universal Software Radio Peripheral) radio, an antenna, an amplifier as well as a laptop running the GNU Radio software to test if they can control Siri, Cortana and Google Now remotely. Unfortunately the straightforward answer is yes, although there … |More